A CIA Cyber False Flag

New revelations from Wikileaks’ 'Vault 7' leak shed a disturbing light on the safeguarding of privacy. Something already known and largely suspected has now become documented by Wikileaks. It seems evident that the CIA is now a state within a state, an entity out of control that has even arrived at the point of creating its own hacking network in order to avoid the scrutiny of the NSA and other agencies.

Reading the revelations contained in the documents released by WikiLeaks and adding them to those already presented in recent years by Snowden, it now seems evident that the technological aspect regarding espionage is a specialty in which the CIA, as far as we know, excels. Hardware and software vendors that are complicit -- most of which are American, British or Israeli -- give the CIA the opportunity to achieve informational full-spectrum dominance, relegating privacy to extinction. Such a convergence of power, money and technology entails major conflicts of interest, as can be seen in the case of Amazon AWS (Amazon's Cloud Service), cloud provider for the CIA, whose owner, Jeff Bezos, is also the owner of The Washington Post. It is a clear overlap of private interests that conflicts with the theoretical need to declare uncomfortable truths without the need to consider orders numbering in the millions of dollars from clients like the CIA.

While it is just one example, there are thousands more out there. The perverse interplay between media, spy agencies and politicians has compromised the very meaning of the much vaunted democracy of the land of the Stars and Stripes. The constant scandals that are beamed onto our screens now serve the sole purpose of advancing the deep interest of the Washington establishment. In geopolitical terms, it is now more than obvious that the deep state has committed all available means toward sabotaging any dialogue and détente between the United States and Russia. In terms of news, the Wikileaks revelations shed light on the methods used by US intelligence agencies like the CIA to place blame on the Kremlin, or networks associated with it, for the hacking that occurred during the American elections.

Perhaps this is too generous a depiction of matters, given that the general public has yet to see any evidence of the hacking of the DNC servers. In addition to this, we know that the origin of Podesta’s email revelations stem from the loss of a smartphone and the low data-security measures employed by the chairman of Hillary Clinton’s presidential campaign. In general, when the 16 US spy agencies blamed Russia for the hacking of the elections, they were never specific in terms of forensic evidence. Simply put, the media, spies and politicians created false accusations based on the fact that Moscow, together with RT and other media (not directly linked to the Kremlin), finally enjoy a major presence in the mainstream media. The biggest problem for the Washington establishment lies in the revelation of news that is counterproductive to the interests of the deep state. RT, Sputnik, this site and many others have diligently covered and reported to the general public every development concerning the Podesta revelations or the hacking of the DNC.

Now what is revealed through Wikileaks’ publications in Vault 7 is the ability of a subsection of the CIA, known as Umbrage, to use malware, viruses, trojans and other cyber tools for their own geopolitical purposes. The CIA’s Umbrage collects, analyzes and then employs software created variously from foreign security agencies, cyber mafia, private companies, and hackers in general. These revelations become particularly relevant when we consider the consequences of these actions. The main example can be seen in the hacking of the DNC. For now, what we know is that the hacking - if it ever occurred - is of Russian origin. This does not mean at all that the Kremlin directed it. It could actually be very much the opposite, its responsibility falling into the category of a cyber false-flag. One thing is for sure: all 16 US intelligence agencies are of the view that “the Russians did it”. That said, the methods used to hack vulnerabilities cannot be revealed, so as to limit the spread of easily reusable exploits on systems, such as the one that hosted the DNC server. It is a great excuse for avoiding the revelation of any evidence at all.

So, with little information available, independent citizens are left with very little information on which to reliably form an opinion on what happened. There is no evidence, and no evidence will be provided to the media. For politicians and so-called mainstream journalists, this is an acceptable state of affairs. What we are left with instead is blind faith in the 16 spy agencies. The problem for them is that what WikiLeaks revealed with Vault 7 exposes a scenario that looks more likely than not: a cyber false-flag carried out by the Central Intelligence Agency using engineered malware and viruses made in Russia and hypothetically linking them back to hacking networks in Russia. In all likelihood, it looks like the Democrats’ server was hacked by the CIA with the clear objective of leaving Russian fingerprints and obvious traces to be picked up by other US agencies.

In this way, it becomes easier to explain the unique views of all 16 spy agencies. Thus, it is far more likely that the CIA intentionally left fake Russian fingerprints all over the DNC server, thereby misleading other intelligence agencies in promoting the narrative that Russia hacked the DNC server. Of course the objective was to create a false narrative that could immediately be picked up by the media, creating even more hysteria surrounding any rapprochement with Russia.

Diversification of computer systems.

The revelations contained in the Wikileaks vault 7 (less than 1 % of the total data in Wikileaks’ possession has been released to date) have caused a stir, especially by exposing the astonishing complicity between hardware and software manufacturers, often intentionally creating backdoors in their products to allow access by the CIA and NSA. In today’s digital environment, all essential services rely on computer technology and connectivity. These revelations are yet more reason why countries targeted by Washington, like China, Russia, Iran and North Korea, should get rid of European and American products and invest in reducing technological dependence on American products in particular.

The People's Republic has already started down this track, with the replacement of many network devices with local vendors like Huawei in order to avoid the type of interference revealed by Snowden. Russia has been doing the same in terms of software, even laying the groundwork to launch of its own operating system, abandoning American and European systems. In North Korea, this idea was already put into practice years ago and is an excellent tool for deterrence for external interference. In more than one computer security conference, US experts have praised the capabilities of the DPRK to isolate its Internet network from the rest of the world, allowing them to have strong safety mechanisms. Often, the only access route to the DPRK systems are through the People's Republic of China, not the easiest way for the CIA or NSA to infiltrate a protected computer network.

An important aspect of the world in which we live today involves information security, something all nations have to deal with. At the moment, we still live in a world in which the realization of the danger and effect of hacking attacks are not apparent to many. On the other hand, militarily speaking, the diversification and rationalization of critical equipment in terms of networks and operability (smartphones, laptops, etc) has already produced strong growth in non-American and European manufacturers, with the aim of making their systems more secure.

This strengthening of technology also produces deleterious consequences, such as the need for intelligence agencies to be able to prevent the spread of data encryption so as to always enjoy access to any desired information. The birth of the Tor protocol, the deployment of Bitcoin, and apps that are more and more encrypted (although the WikiLeaks documents have shown that the collection of information takes place on the device before the information is encrypted) are all responses to an exponential increase in the invasion of privacy by federal or American government entities.

We live in a world that has an enormous dependence on the Internet and computer technology. The CIA over the years has focused on the ability to make sure vulnerable systems are exploited as well as seeking out major security flaws in consumer products without disclosing this to vendors, thereby taking advantage of these security gaps and leaving all consumers with a potential lack of security. Slowly, thanks to the work and courage of people like Snowden and Assange, the world is beginning to understand how important it is to keep personal data under control and prevent access to it by third parties, especially if they are state actors. In the case of national security, the issue is expanded exponentially by the need to protect key and vital infrastructure, considering how many critical services operate via the Internet and rely on computing devices.

The wars of the future will have a strong technological basis, and it is no coincidence that many armed forces, primarily the Russian and Chinese, have opted in recent years to training troops, and conducting operations, not completely relying on connectivity. No one can deny that in the event of a large-scale conflict, connectivity is far from guaranteed. One of the major goals of competing nations is to penetrate the military security systems of rival nations and be able to disarm the internal networks that operates major systems of defense and attack.

The Wikileaks revelations are yet another confirmation of how important it is to break the technological unipolar moment, if it may be dubbed this way, especially for nations targeted by the United States. Currently Washington dictates the technological capacities of the private and government sectors of Europe and America, steering their development, timing and methods to suit its own interests. It represents a clear disadvantage that the PRC and its allies will inevitably have to redress in the near future in order to achieve full security for its vital infrastructure.

I'm making over $7k a month working part time. I kept hearing other people tell me how much money they can make online so I decided to look into it. Well, it was all true and has totally changed my life. This is what I do... http://bit.ly/2jdTzrM

"It seems evident that the CIA is now a state within a state, an entity out of control that has even arrived at the point of creating its own hacking network in order to avoid the scrutiny of the NSA and other agencies."

I thought of the following Hollywood movies that now appear to have a lot of TRUTH in the scripts.

Yep, and the challenge is not just severing the "head", as you put it, but also -- more importantly -- being sure you have in fact severed the *real* head. How will we know when the actual head has been identified, let alone severed?? Proxies within proxies. Many many heads. False heads may be offered up as sacrificial culprits to throw us off the scent. The "Beast", as you term it, may be best re-named "Hydra", after the many-headed serpent in Greek mythology.

Whoever (Stan Lee?) came up with the name "Hydra" for the evil organisation Captain America battles with may have been onto something :)

"It represents a clear disadvantage that the PRC and its allies will inevitably have to redress in the near future in order to achieve full security for its vital infrastructure".

Leaving all the CIA created backdoors in US equipment to be exploited by both adversaries AND hackers alike. Which is precisely what Snowden and Assange have been warning about. So, in the next stage, it will be China and Russia, who will not have such vulnerabilities, that will have the advantage

The idea that the CIA hacked the DNC leads a person to two different hypotheses based on the speculation:

1) The CIA is really in the bag for Trump because the effect of the DNC hack had a damaging effect on the Clinton campaign and helped her lose, or

2) It was an attempt to frame Trump as colluding with Russia in hopes of destroying him before he became president.

In the case of 1, It hurt Clinton much more than it hurt Trump. It helped Trump.

In the case of 2, why not just trump up some "evidence" by other means that shows Trump colluded with Russia, instead of hurting the Clinton campaign in the process? They obviously have the capability to provide whatever reality they want to the public which means hypothesis 2 is falsified. If 2 were true it clearly backfired.

It doesn't make sense but it is one objective conclusion. It seems backwards but what doesn't these days? The CIA wanted Trump and all the world's a stage... (while boots are marching on the ground in Syria, in South Korea....Yemen, soon to be Iran)

Every hero needs a villan. Hillary was the villan to make Trump look the hero.

I may have missed something but I thought the DNC was a leak and not a hack. You did have Seth Rich shot in the back in a robbery where nothing was stolen so that lends credence to the leak theory.

The "Russia hacked DNC" came with zero evidence and appeared nothing more than an opportunstic way to frame it so they could deflect attention to the Trump/Russia narrative and minimize focus on contents of the leaks, a tactic which MSM was very happy to play along with.

Then they repeated it with Podesta who fell victim to a phishing attack which could have been ANYONE (CIA, Russians, any other state player or even a lone-wolf hacker).

OR 3, The Trump Russian interfering / collaboration meme, just didn't sell with MUCH of the public, ..

Seems to me, these "competing narratives", were NOT suppose to happen. Enter Wikileaks, which demonstrated that yes Mr. and Mrs. America, the election shit show really IS rigged and look who was rigging it! Why none other than the "Hill" who, as fate would have it, SABOTAGED the other populist rival, BERNIE SANDERS ...

Competing deep state narratives, which they lost COMPLETE control over. DJT was NEVER suppose to WIN this thing, by most EVERY main stream account. Upshot now is, THIS has created a shitstorm of a major problem.

Listen to what things are being said, INCREASING deep state angst and paranoia. People have and ARE catching on, to just how badly they've been screwed over. Donald J Trump was a BLACK SWAN ..

So, once you start from that premise, what is going on now makes complete sense.

HOW, does deep state regain "credibility?" Well certainly in my opinion, they can't. They just can't.

UNLESS something BIG can be created, and that big thing, MUST create, instill fear, which is the chief activator. Must keep the citizens in fear at any and all costs, otherwise, the loss of control continues unabated. THIS is intolerable for Big Brother, who, more than anything else, does not enjoy being ridiculed, laughed at, or scorned.

I do not make regular habit of watching MSM, however the TV was turned on in another room, and it was loud. It was "shocking" the DEPTH of the propaganda and hate filled rhetoric, AGAINST DJT and of course Putin.. We are living in historical, epically so, times. Frankly, I'm glad I did not miss it. TRUTH, no matter how painful, MUST win the day and Trump, who is many things, to many people, appears at least to be the "vehicle" that is allowing the pulling back of the curtain.

"Just because this is serious there's no need to lose your head about these things young woman" said the King's executioner to Catherine Boleyn, to which she (Was rumored to have) replied to the head (sic) man of the head of England prior to the German invasion, "TELL HIS MAJESTY TO GO BITE HIMSELF" ~ Oh well, my poor attempt at humor passed, the deep state the article mentions is nothing more than the top four levels of it's best known most secretive secret society, and has been that way ever since 1670 when Bavarian Illuminati took over the top four levels of Grand Lodge ~ Within 200 years that created the structure which used honest Abe Lincoln to leave that $100 million in cash bearer bonds ($1 to $8 trillion in today's money) carelessly laying around in New York for Tammany House chief Boss Tweed to steal and take to Europe ~ That money financed arms cartel's, German descent robber baron's, stole Russia's gold in 1907 to finance the creation of the US Fed which itself eventually financed the looting of Europe's gold in World War Two, that then financing the Fed in 1973 to finance Reaganomics in the 1980's which ensconced the workings of said deep state into all levels of the American political system thru the Young Republican network...

.

'CONCLUSION?" ~ You've got enough information to know that you need a 100% treason amnesty America, all of the way back to before that supposedly dead Palestinian born Nazi General shot Kennedy 2 weeks before Dealy Plaza, matter of fact a good five years before that when the US Air Force "LOST" (Snigger) that hydrogen bomb over the everglades or wherever it was ~ The real deep state is just America's not-so-secret secret societies ~ Get a grip, quit being so fearful about the larger issues, your Central Intelligence Agency sprang from the 'OSS' which was, well, the British Masonic monarch's "Oooooh, 'SS" ~ Chill out...

.

"THE COMPANY" they used to mockingly call it, like a Pax Americana East Indies trading company...

Search a little deeper in the blog (s) and you might get to a part where (Told me in person) 41 and Donald Dumsfeld did a kabbalistic 3-way with Obama's real daddy 'X' after (Correction, before) he'd already supposedly died in that fake New York shooting the subject of this article (CIA) set up, with his royal 'HIMNESS' (41) chuckling constantly because 'DD' was in the front of the daisy train, 41 being the caboose, and 'BIG RED' in the middle up the behind of 'DD' was extremely well endowed in the male bits, extremely well endowed, Long John Holmes style, you also can't make 'THAT' shit up and still have a grasp of what's really funny in this morbid world Putaipan ~ I-keep it real merely because it's funnier that way ;-)

They all need to go. The banker trash will try to salvage whatever they can from these arbitrary agencies once they get nailed. Don't ever believe that the CIA was the only bad apple or that the agencies were good with only a few bad apples. If these agencies continue to exist you are a slave or worse. They are masters of deception.

Julian has been dead for months. The massive ddos outage in the end on October keep the dead man's switch from going anywhere regardless of activation. Check out RTs YouTube channel and find his January "interview". Watch his collar starting around 17(?) minutes in; specifically the collar point on his left/our right. Shirt collars don't normally act like shark teeth.

Power corrupts. Secrecy corrupts. Lack of consequences corrupts. "Cui bono" must always be asked. Trump can declare the CIA, the "Enemy of the People"; revoke all security clearances; and have a small military unit seal off Langley. The US has other intelligence organizations for security info. Let Trump uses the words of Truman and Kennedy; a litany of false flags and lies; and the Constitution as props.

the general public has yet to see any evidence of the hacking of the DNC servers. (...) In general, when the 16 US spy agencies blamed Russia for the hacking of the elections, they were never specific in terms of forensic evidence. Simply put, the media, spies and politicians created false accusations ....

True, but again, as per Main Stream (street) Brain Washing, it is now most certainly accepted as FACT ..

Now that may not gain any traction or mean much here, but there is a shit ton of citizens who will have taken it as 100% actual fact. Robert Gates has no doubts, as many others in the "intel" business. They feed this meme on the airwaves 24/7, relentlessly. I got a small dose tonight. Besides making me want to puke, it is extremely effective brain washing, or in my case, brain drain. It is extremely intoxicating and of course "toxic." I shit you not. It ain't for the faint (feint) of heart, like certain members within my own tribe. I mean talk about your paranoia inducing madness. Fareed is doing an excellent "job."

Btw, Fareed it appears has done many "friendly" interviews with the dark lord himself (soros) making that sociopath appear oh so civic minded and "normal." Also as per "Fareed" Putin HATES Hillary for her very public comments and statements, attacking PUTIN in his last election bid, nearly "sabotaging" him in that "crooked re-election campaign." Now of course it was Russian payback time, ergo why Hillary was sabotaged by the Russians and lost HER own bid ..

First thing off the top of my head is, I'm sure PUTIN DOES despise her. If THAT alone were a crime, well, many of us would be in the gulags already, along with Putin. But, even if that were the case, with no credible evidence provided, who the fuck is kidding who here regarding MEDDLING in the elections and affairs of other nation states. Is not turn about fair play?

Apparently not.

These asshats have hoisted themselves on their own petards, and now cry, FOUL! Christ, is there no boundaries or sense of decency, shame and / or hypocrisy?

Apparently not ..

So, not only do we have major "disinformation" campaigns coming in a variety of flavors, in the Russian meme and oh so many other things, its near impossible to even TRY to keep up, with the level, speed, and force of the lies, lying and utter bullshit.

This is what the lawyers fondly call, the shotgun approach OR failing that, throw enough shit on the wall, something is bound to stick after awhile. And as already mentioned, it is sticking, just enough mind you, to influence, disturb the minds of a great many folks, who don't know any better, or of course play to it's other kin call, APATHY ..

Now the neat thing here is, while the rapidity of the bullshit increases, as does the sheer volume of it, other important things get glossed over, and pushed aside endlessly. Meanwhile the special op code named, Mission Operations Language Occidental Casting Hell, code name, MOLOCH states as its mission purpose, It is all bullshit, all the time, to create as much doubt, confusion, uncertainty, insecurity, disruption and mind numbing hilarity as humanly possible ...